Final rule landed: CMMC’s final rule took effect 26 Dec 2024; DoD began accepting certifications 31 Jan 2025. Select contracts already demand proof, and virtually every new award will by Q3 2025.
Level 1 & Level 2 are the new floor: Since 1 Mar 2025 any supplier touching Federal Contract Information (FCI) must self-attest to Level 1, and anyone handling Controlled Unclassified Information (CUI) needs a third-party Level 2 certificate.
Your SPRS score is a gatekeeper: Contracting officers pull it automatically under DFARS 252.204-7024. A low or missing score kills your bid before price is even read.
Budget realistically: A 50-seat shop going for Level 2 will spend somewhere between $25 k and $150 k on remediation plus ~$105–118 k for the on-site audit.
Automation is the lifeline: Evidence collection, policy writing, and continuous monitoring can be largely hands-off if you pick the right toolkit (hint: TryComplai).
CMMC—the Cybersecurity Maturity Model Certification—exists to keep CUI from leaking out of the vast DoD supply chain. Version 2.0 trimmed the old five-level labyrinth down to three, aligned everything directly with NIST SP 800-171, and let low-risk outfits self-assess at Level 1 while reserving outside audits (via C3PAOs) for Level 2 and above.
Five levels down to three. Simpler scoping and messaging.
No more “maturity processes.” You now show 110 practices—exactly the same set in NIST 800-171.
Self-assessment allowed for Level 1 (and some Level 2 programs). Massive cost break for firms that only handle FCI.
Certification cycle is three years, with short annual affirmations instead of a monster audit every 12 months.
Level 1 — Foundational
Data you touch: FCI only.
Assessment: Annual self-attestation uploaded to SPRS.
Typical organisations: COTS resellers, janitorial, catering, basic services.
Level 2 — Advanced
Data you touch: Any form of CUI.
Assessment: Independent C3PAO audit every three years plus annual affirmation.
Typical organisations: Machine shops, engineering consultancies, cloud-based SaaS holding tech data, niche manufacturers.
Level 3 — Expert
Data you touch: High-value CUI or systems critical to national security.
Assessment: DoD-led government team.
Typical organisations: Major primes, top-tier R&D labs, defence OEMs.
26 Dec 2024 – Final Rule Published
Begin a gap analysis.
31 Jan 2025 – Certification Applications Open
Create an eMASS account, interview C3PAOs, reserve an audit slot.
1 Mar 2025 – CMMC Clauses on Select RFPs
Upload a non-zero SPRS score or risk instant disqualification.
Q3 2025 – Large-Scale Roll-Out
Expect most new solicitations to cite CMMC language.
31 Oct 2026 – Early Adopter Period Closes
By this point CMMC verbiage is routine in everything except micro-purchases.
1 Mar 2028 – Full Implementation
First wave of three-year certificates begin to expire; plan your re-assessment calendar.
Below is the most common spend profile for a 25- to 150-person firm seeking Level 2:
Initial gap analysis & self-assessment: $5 k – 10 k
Remediation & IT upgrades: $20 k – 150 k (multi-factor auth, log aggregation, encryption, etc.)
Policy & documentation work (SSP, POA&M): $8 k – 25 k
C3PAO on-site audit: $105 k – 118 k
Annual monitoring & staff training: $4 k – 12 k
Total three-year burn: roughly $150 k – 300 k. Pricey—until you compare it with the profit on even one modest DoD task order.
Think of Supplier Performance Risk System as a public credit score for cybersecurity. Perfect is 110; each unmet control costs 1–5 points.
How to work it out quickly:
Grab the latest NIST 800-171A spreadsheet.
Mark each control “Implemented,” “Partially,” or “Not.”
Subtract the point penalties, hit “sum,” and upload both the score and your POA&M due dates to SPRS.
Contracting officers must pull that score—by law—before award. Low score? You’re toast, even if you underbid by 20 percent.
Turn on MFA for everyone (Microsoft/Google 365 conditional access).
Encrypt and replicate backups to an immutable bucket (S3, Wasabi, Backblaze B2).
Aggregate logs—forward Windows events to a central collector.
Export an asset inventory from your RMM or MDM; tag devices that process CUI.
Tighten patch management—14-day max for critical CVEs.
Draft an incident-response plan and run a tabletop drill.
Add tamper-proof shred bins or a degausser for secure disposal; document every use.
Pull door-badge logs weekly and keep them for 90 days.
Disable legacy protocols (SMB v1, TLS 1.0); force TLS 1.2+.
Launch a security-awareness course (phishing basics, credential hygiene) and capture completion certificates.
Close even half of those and your SPRS score jumps—sometimes by double digits.
Policy sprawl, solved: One-click AI generator maps every NIST family to plain-English policy docs stamped with your organisation’s details.
Evidence on autopilot: Pre-built integrations pull logs, MFA status, asset lists, and screenshots nightly, then attach them to the correct controls.
SPRS score in real time: A live dashboard shows your current score, plus how many points you’ll regain as each POA&M item closes.
Auditor-ready exports: Share a read-only portal with your C3PAO; they see the exact artefacts in the format they expect—no frantic PDF printing.
Customers report 50–70 percent less prep time before audit week and remediation savings that often pay for the subscription outright.
“We’re only two people; DoD won’t care.” Even a single-part reseller moving FCI must show Level 1.
Over-engineering Level 1. You don’t need a full SIEM or zero-trust stack if you never touch CUI; spend where it matters.
Treating CMMC as a one-off project. Controls like patching, backups, and log review are daily disciplines. Automate or slide backwards.
Blind trust in your MSP. Most managed-services contracts cover uptime, not CUI-specific controls. Verify the configs yourself.
Last-minute assessor booking. C3PAO calendars are jam-packed six to nine months ahead—lock in an audit date early.
Map every data flow—identify exactly where CUI lives.
Register in SPRS and eMASS.
Perform a gap analysis against NIST 800-171.
Assign clear control owners (IT, HR, Ops).
Prioritise high-value controls (MFA, logging, encryption).
Draft an SSP and a living POA&M.
Implement technical fixes; capture artefacts as you go.
Set up dashboards for continuous monitoring.
Schedule your C3PAO assessment (Level 2+).
Conduct a dry-run internal audit.
Upload your SPRS score and annual affirmation.
Keep evidence fresh and run refresher training every quarter.
CMMC 2.0 isn’t a rumour any more; it’s live and already influencing awards. The winners in the small-to-mid Defence Industrial Base will be the firms that:
Start their gap assessment now
Knock out the highest-value controls first
Automate evidence capture and policy management
Treat compliance as a never-ending discipline, not a once-every-three-years paperwork sprint
Ready to make CMMC painless? Spin up a free TryComplai sandbox, connect your environment in minutes, and watch your real-time SPRS score climb—before the next RFP drops.
Because losing a contract over paperwork stings more than losing on price.
No—but a low score almost guarantees you lose. It’s pass/fail gatekeeping before price even enters the conversation.
Yes. An enclave strategy lets you ring-fence CUI workloads, shrinking audit scope and cost.
You get 90 days to close findings via POA&M. Miss that window and your certificate is withheld—expect no new awards and possibly a stop-work on existing ones.
Every three years, with a lightweight self-attestation each year in between. Large environment changes (e.g. moving to a new cloud) can trigger an early reassessment.
Your cloud provider may inherit some controls, but you still have to show how you do the customer-side pieces—identity, data marking, log review, incident response.
POPULAR POSTS
by Mike Hayles- July 5th, 2025
By Mike Hayles on June 26th, 2025
By Mike Hayles on June 28th 2025
NEWSLETTER
Subscribe to our mailing list to get the new updates.